General

  • Target

    1120-135-0x0000000000400000-0x000000000042E000-memory.dmp

  • Size

    184KB

  • MD5

    01ea7aec150de4f3894ef7e09a5b10c6

  • SHA1

    969949b8bb950fb6288c322cc8e813419dd661ca

  • SHA256

    7a77874df02b449826eea0fc9281f3cc4c9ff5c91f91a0ed7dd931890f81fde2

  • SHA512

    c8e021f51bea4ca82da0b471a60188679bdb99b1aef6944d28021f36425b529f8fd7c53e5a079d0f708795b42c09a3a56c48af5c5181a2fd07a4d2c8d1ed1787

  • SSDEEP

    1536:7aIRzICbajb+qhVZCGWDdmWPoQ8Wc94NiHjS4Z1oUg6TGqV4VWbuBNkqYvMd84wB:ZsznuH8WcaN2jxsqV4cUK1vMdl8e8hJ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

metro

C2

83.97.73.127:19045

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1120-135-0x0000000000400000-0x000000000042E000-memory.dmp
    .exe windows x86


    Headers

    Sections